Fraud Resolution

Password management

Posted on Jun 19 2012 by

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect [...]

Share

Extended fraud resolution is the new standard

Posted on Mar 05 2012 by

Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to [...]

Share

Are you in hiding after a data breach? Watch our new video.

Posted on Jan 31 2012 by

Tweet

Share

Consequences following a data breach

Posted on Jan 25 2012 by

Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long term.

Share

How data breaches harm reputations

Posted on Jan 17 2012 by

The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss.

Share

The dollars of a data breach

Posted on Aug 16 2011 by

It’s no surprise that data breaches are expensive. The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years.

Share

As organized crime goes virtual, the law cyber-saddles up

Posted on Jul 26 2011 by

Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.

Share

Trouble in the clouds: Data breaches threaten cloud computing

Posted on Jul 19 2011 by

Cloud services that handle enormous amount of data amongst consumers and corporate clients are a big target of fraudsters.

Share

8 insights into the underground fraud economy

Posted on May 24 2011 by

These days, the fraud economy has matured to a point where it is run like a global marketplace, with specialists for every aspect of fraud – from identity thieves to the consumers of stolen identities.

Share

Data breaches – to prepare or not to prepare? The answer is simple.

Posted on May 17 2011 by

All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan.

Share